Skip to main content
Skip table of contents

CVE-2022-22965 - Security Vulnerability Spring4shell - Spring Framework

Vulnerability statement

Upon receiving reports of the Spring4Shell software vulnerability, the Nexthink Security team analyzed to determine any potential impacts on our systems.

Vulnerability summary

  • The Spring Framework is an application framework and inversion of the control container for the Java platform.

  • On March 31, 2022, a critical vulnerability (CVE-2022-22965) impacting the Spring Framework was reported, resulting in patches from the vendor.

  • This vulnerability is being widely exploited in the wild.

Are Collector and the client-side components affected?

Collector and the client-side components (Finder, Data Enricher, Event Connector, and Chatbot SDK) do not use the affected library.

Is the Nexthink V6 platform product affected?

The V6 components do not use the library in the affected configuration.

Are the Nexthink corporate network and supply chain affected?

Our Security team also performed a vulnerability assessment with our third-party vendors to ensure that this vulnerability does not impact the services they provide us with.

How is Nexthink protecting its product against vulnerabilities?

Our Engineering Security policy and Vulnerability Management policy (which can be shared under NDA) describe high-level principles we apply to detect, mitigate, and patch these vulnerabilities. The secure software development lifecycle is an integral part of our security program. Nexthink implemented several security controls to detect vulnerabilities from the early design stages to the release of the product and cloud offering. It includes but is not limited to design reviews, penetration tests of different components, vulnerability scans, third-party library assessments, and code reviews.

References

https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.